July 2006

Email filtering tools help organizations enforce acceptable use policies, filtering office email and blocking personal email traveling over the corporate network. This tip introduces the two classes of email filtering tools and how to choose the one...
Continue Reading

After phasing out some appliances and watching EMC reel in RSA, some say Symantec is strategically adrift. To correct its course, experts say it must satisfy the demand for better product integration.
Continue Reading

Password synchronization is an authentication process that coordinates user passwords across various computers and computing devices so a user only has to remember a single password instead of multiple passwords for different machines or devices.
Continue Reading

Vendors have responded to the de-perimeterization of corporate networks with products designed to perform "health checks" of connecting devices, permitting access based on the security status of the endpoint. This article provides an overview of ...
Continue Reading

Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores ...
Continue Reading

The Department of Homeland Security has issued the final version of the National Infrastructure Protection Plan, but some say it falls short of being a comprehensive risk management framework for the nation's infrastructure.
Continue Reading